"value":"A vulnerability in the Clientless SSL VPN (WebVPN) component of Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to conduct browser-based attacks. This vulnerability is due to improper validation of input that is passed to the Clientless SSL VPN component. An attacker could exploit this vulnerability by convincing a targeted user to visit a website that can pass malicious requests to an ASA device that has the Clientless SSL VPN feature enabled. A successful exploit could allow the attacker to conduct browser-based attacks, including cross-site scripting attacks, against the targeted user."
},
{
"lang":"es",
"value":"Una vulnerabilidad en el componente Clientless SSL VPN (WebVPN) del software Cisco Adaptive Security Appliance (ASA) podr\u00eda permitir a un atacante remoto no autenticado conducir ataques basados en el navegador. Esta vulnerabilidad es debido a que no son comprobadas apropiadamente las entradas que son pasadas al componente Clientless SSL VPN. Un atacante podr\u00eda explotar esta vulnerabilidad al convencer a un usuario objetivo para que visite un sitio web que pueda pasar peticiones maliciosas a un dispositivo ASA que tenga habilitada la funci\u00f3n Clientless SSL VPN. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante llevar a cabo ataques basados en el navegador, incluyendo ataques de tipo cross-site scripting, contra el usuario objetivo"